Microchip TimeProvider 4100: When Your Clock’s Got Jokes – Stored XSS Vulnerability Revealed
Attention tech enthusiasts and cyber sleuths: The Microchip TimeProvider 4100 grandmaster has a stored XSS vulnerability in its banner feature. This means your custom banner might just execute a surprise JavaScript payload. So, when customizing, remember: keep it clean or your banner might end up with more action than a blockbuster movie!

Hot Take:
Looks like the Microchip TimeProvider 4100 is keeping time with the latest trends—namely, being the unfortunate host of a stored XSS vulnerability. Turns out, synchronizing your clocks might come with an unexpected side of JavaScript pop-ups. It’s a bit like finding a worm in your apple, only this one’s got a penchant for executing arbitrary scripts. Who knew telling time could be so… interactive?
Key Points:
- Microchip TimeProvider 4100 has a stored XSS vulnerability in the custom banner configuration.
- Firmware versions affected range from 1.0 to 2.4.7, with 2.3.12 confirmed vulnerable.
- Vulnerability allows execution of arbitrary scripts in user context.
- Exploit involves inserting malicious JavaScript via device’s web interface.
- CVE-2024-43687 is assigned to this vulnerability.
Already a member? Log in here